Reference Hub7
Obtaining Security Requirements for a Mobile Grid System

Obtaining Security Requirements for a Mobile Grid System

David G. Rosado, Eduardo Fernández-Medina, Javier López, Mario Piatini
Copyright: © 2009 |Volume: 1 |Issue: 3 |Pages: 17
ISSN: 1938-0259|EISSN: 1938-0267|ISSN: 1938-0259|EISBN13: 9781616920920|EISSN: 1938-0267|DOI: 10.4018/jghpc.2009070101
Cite Article Cite Article

MLA

Rosado, David G., et al. "Obtaining Security Requirements for a Mobile Grid System." IJGHPC vol.1, no.3 2009: pp.1-17. http://doi.org/10.4018/jghpc.2009070101

APA

Rosado, D. G., Fernández-Medina, E., López, J., & Piatini, M. (2009). Obtaining Security Requirements for a Mobile Grid System. International Journal of Grid and High Performance Computing (IJGHPC), 1(3), 1-17. http://doi.org/10.4018/jghpc.2009070101

Chicago

Rosado, David G., et al. "Obtaining Security Requirements for a Mobile Grid System," International Journal of Grid and High Performance Computing (IJGHPC) 1, no.3: 1-17. http://doi.org/10.4018/jghpc.2009070101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Mobile Grid includes the characteristics of the Grid systems together with the peculiarities of Mobile Computing, with the additional feature of supporting mobile users and resources in a seamless, transparent, secure and efficient way. Security of these systems, due to their distributed and open nature, is considered a topic of great interest. In this article we present the practical results of applying a secured methodology to a real case, specifically the approach that define, identify and specify the security requirements. This methodology will help the building of a secured grid application in a systematic and iterative way.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.